Immersive Network Monitoring

In this paper we present our immersive network monitoring system that is used for real-time and retrospective analysis of network traffic. Our 3-D representations are designed from the perspective of monitoring traffic at an administrative boundary between the Internet and an internal network. In our virtual environment, a physical boundary and defended territory serve as a familiar visual metaphor for users. The user is provided with multiple ways of exploring the environment and interrogating visual objects for additional information and synchronizing the environment with external analysis tools. We have used this system on complete data from multiple sites for purposes of situational awareness and detecting and analyzing traffic patterns for anomalous behavior.

[1]  Deborah Estrin,et al.  Network Visualization with Nam, the VINT Network Animator , 2000, Computer.

[2]  kc claffy,et al.  Otter: A general-purpose network visualization tool , 1999 .

[3]  K. Claffy,et al.  Topology discovery by active probing , 2002, Proceedings 2002 Symposium on Applications and the Internet (SAINT) Workshops.

[4]  Deborah A. Frincke,et al.  Intrusion and Misuse Detection in Large-Scale Systems , 2002, IEEE Computer Graphics and Applications.

[5]  George Varghese,et al.  Agile and scalable analysis of network events , 2002, IMW '02.

[6]  G. Lakoff,et al.  Metaphors We Live by , 1982 .

[7]  Jock D. Mackinlay,et al.  Information visualization using 3D interactive animation , 1991, CHI.

[8]  Kenneth C. Cox,et al.  3D geographic network displays , 1996, SGMD.

[9]  Robert F. Erbacher,et al.  MULTI-NODE MONITORING AND INTRUSION DETECTION , 2022 .

[10]  Bill Cheswick,et al.  Mapping and Visualizing the Internet , 2000, USENIX Annual Technical Conference, General Track.

[11]  Jeffery A. Brown,et al.  Network Performance Visualization: Insight Through Animation. , 2000 .

[12]  S. Ullman,et al.  The interpretation of visual motion , 1977 .

[13]  Ronald J. Brachman,et al.  Brief Application Description; Visual Data Mining: Recognizing Telephone Calling Fraud , 2004, Data Mining and Knowledge Discovery.

[14]  Stephen G. Eick,et al.  Constructing interactive network visual interfaces , 1998, Bell Labs Technical Journal.